Skip to main content

Privacy-Preserving Security Framework for a Social-Aware Internet of Things

  • Conference paper
Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services (UCAmI 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8867))

Abstract

As smart objects are getting part of our personal space, the new associated services must tackle both, the inherent requirements of IoT and the needs of citizens using such services. Security, trust and privacy concerns are the cornerstone requirements of a social Internet of Things, where users want to share and obtain information in a huge opportunistic environment of connected devices and services. The paper presents an IoT security framework, being devised in the scope of SOCIOTAL EU project, which is based on the Architecture Reference Model (ARM) of IoT-A EU project. The framework extends the traditional ARM putting strong emphasis on security, trust and privacy concerns in order to cope with more opportunistic and secure sharing models required in a social-aware IoT scenarios, where users can set up dynamically communities and bubbles of devices and users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Butler fp7 eu project. deliverable 3.2: Integrated system architecture and initial pervasive butler proof of concept (2013)

    Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Elsevier Computer Networks 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization. Computer Networks (2012)

    Google Scholar 

  4. Bassi, A., Bauer, M., Fiedler, M., Kramp, T., van Kranenburg, R., Lange, S., Meissner, S.: Enabling things to talk (2013)

    Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321–334. IEEE (2007)

    Google Scholar 

  6. Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Dcapbac: Embedding authorization logic into smart things through ecc optimizations. International Journal of Computer Mathematics, 1–22 (2014)

    Google Scholar 

  7. Sotiriadis, S., Petrakis, E.G., Covaci, S., Zampognaro, P., Georga, E., Thuemmler, C.: An architecture for designing future internet (fi) applications in sensitive domains. In: 2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE), pp. 1–6. IEEE (2013)

    Google Scholar 

  8. Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94–104 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bernal Bernabe, J., Hernández, J.L., Moreno, M.V., Skarmeta Gomez, A.F. (2014). Privacy-Preserving Security Framework for a Social-Aware Internet of Things. In: Hervás, R., Lee, S., Nugent, C., Bravo, J. (eds) Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. UCAmI 2014. Lecture Notes in Computer Science, vol 8867. Springer, Cham. https://doi.org/10.1007/978-3-319-13102-3_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13102-3_67

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13101-6

  • Online ISBN: 978-3-319-13102-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics